Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Handbook of wireless networks and mobile computing
On using the ad-hoc network model in cellular packet data networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
SPINS: security protocols for sensor networks
Wireless Networks
Cross-Layer Design for Data Accessibility in Mobile Ad Hoc Networks
Wireless Personal Communications: An International Journal
Denial of Service in Sensor Networks
Computer
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Towards a Survivable Security Architecture for Ad-Hoc Networks
Revised Papers from the 9th International Workshop on Security Protocols
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Strategies for enhancing routing security in protocols for mobile ad hoc networks
Journal of Parallel and Distributed Computing - Special issue on Routing in mobile and wireless ad hoc networks
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Small worlds in security systems: an analysis of the PGP certificate graph
Proceedings of the 2002 workshop on New security paradigms
Report on a working session on security in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
Securing Mobile Ad hoc Networks — A Motivational Approach
BT Technology Journal
Research Issues in Ad-Hoc Distributed Personal Networking
Wireless Personal Communications: An International Journal
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Detecting Network Attacks in the Internet via Statistical Network Traffic Normality Prediction
Journal of Network and Systems Management
Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Secure Hosts Autoconfiguration in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Two-tier agent architecture for trusted communication in ad-hoc mobile networks
WISICT '04 Proceedings of the winter international synposium on Information and communication technologies
Towards a new paradigm for securing wireless sensor networks
Proceedings of the 2003 workshop on New security paradigms
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A certificate revocation scheme for wireless ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Secure long term communities in ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Pilot: Probabilistic Lightweight Group Communication System for Ad Hoc Networks
IEEE Transactions on Mobile Computing
Quality of service in mobile ad hoc networks
The handbook of ad hoc wireless networks
Unicast routing techniques for mobile ad hoc networks
The handbook of ad hoc wireless networks
Security in wireless ad hoc networks
The handbook of ad hoc wireless networks
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA)
Mobile Networks and Applications
Key distribution techniques for sensor networks
Wireless sensor networks
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Stigmergic Learning for Self-Organizing Mobile Ad-Hoc Networks (MANET's)
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3
Peer-to-Peer Security in Mobile Devices: A User Perspective
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Collaborative backup for dependable mobile applications
MPAC '04 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Sensor-centric energy-constrained reliable query routing for wireless sensor networks
Journal of Parallel and Distributed Computing
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Securing ad hoc networks through mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Simulating the establishment of trust infrastructures in multi-agent systems
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Information Assurance In Wireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Secure and Efficient Key Management in Mobile Ad Hoc Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Preventing Impersonation Attacks in MANET with Multi-Factor Authentication
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A ZKP-based identification scheme for base nodes in wireless sensor networks
Proceedings of the 2005 ACM symposium on Applied computing
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
Dependable Dynamic Source Routing without a trusted third party
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Authentication protocols for ad hoc networks: taxonomy and research issues
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
EURASIP Journal on Wireless Communications and Networking
A new approach for establishing pairwise keys for securing wireless sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
A quantitative trust establishment framework for reliable data packet delivery in MANETs
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Improved topology assumptions for threshold cryptography in mobile ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
UbiqStack: a taxonomy for a ubiquitous computing software stack
Personal and Ubiquitous Computing
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
Authentication based on multilayer clustering in ad hoc networks
EURASIP Journal on Wireless Communications and Networking
On the performance of ad hoc routing protocols under a peer-to-peer application
Journal of Parallel and Distributed Computing - Special issue: Design and performance of networks for super-, cluster-, and grid-computing: Part II
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
The Green Card Protocol: An Identification Protocol for Decentralized Systems
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Suicide for the common good: a new strategy for credential revocation in self-organizing systems
ACM SIGOPS Operating Systems Review
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs)
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Robust cooperative trust establishment for MANETs
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
A heterogeneous-network aided public-key management scheme for mobile ad hoc networks
International Journal of Network Management
Architectural framework for wireless mobile ad hoc networks (AF WMANETs)
Computer Communications
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Two-tier authentication for cluster and individual sets in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
ANSWER: AutoNomouS netWorked sEnsoR system
Journal of Parallel and Distributed Computing
Robust self-keying mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Service-based P2P overlay network for collaborative problem solving
Decision Support Systems
Secure and efficient key management in mobile ad hoc networks
Journal of Network and Computer Applications
On Dynamic Distribution of Private Keys over MANETs
Electronic Notes in Theoretical Computer Science (ENTCS)
Secure Node Discovery in Ad-hoc Networks and Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
Journal of Computer Security
A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
IEEE Transactions on Parallel and Distributed Systems
Optimal Dispersal of Certificate Chains
IEEE Transactions on Parallel and Distributed Systems
An overlay approach to data security in ad-hoc networks
Ad Hoc Networks
Non-interactive key establishment in mobile ad hoc networks
Ad Hoc Networks
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol
Wireless Personal Communications: An International Journal
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Proceedings of the 9th annual conference on Genetic and evolutionary computation
SecLEACH-On the security of clustered sensor networks
Signal Processing
Integrating a trust framework with a distributed certificate validation scheme for MANETs
EURASIP Journal on Wireless Communications and Networking
Providing distributed certificate authority service in cluster-based mobile ad hoc networks
Computer Communications
Performance evaluation and comparison of different ad hoc routing protocols
Computer Communications
Communications in unknown networks: Preserving the secret of topology
Theoretical Computer Science
A formal model of rational exchange and its application to the analysis of Syverson's protocol
Journal of Computer Security - Special issue on CSFW15
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Sahnet: a secure system for ad-hoc networking using ecc
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Security of predefined groups in manets
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Cryptographic techniques for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A service-centric approach to access control and monitoring based on distributed trust
CASCON '07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Cryptographic Versus Trust-based Methods for MANET Routing Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Defense against outside attacks in wireless sensor networks
Computer Communications
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
Highly stable and adaptive clustering with efficient routing in wireless ad hoc networks
International Journal of Ad Hoc and Ubiquitous Computing
Secure broadcast for inter vehicle communications
International Journal of High Performance Computing and Networking
Secure routing protocol for mobile ad-hoc networks
Proceedings of the 2007 Summer Computer Simulation Conference
On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures
International Journal of Wireless and Mobile Computing
Fault-tolerant and energy efficient cross-layer design for wireless sensor networks
International Journal of Sensor Networks
International Journal of Security and Networks
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Analysis of routing security-energy trade-offs in wireless sensor networks
International Journal of Security and Networks
Key management in ad hoc networks using self-certified public key system
International Journal of Mobile Communications
Service sharing with trust in pervasive environment: now it's time to break the jinx
Proceedings of the 2008 ACM symposium on Applied computing
A security policy system for mobile autonomic networks
Proceedings of the 1st international conference on Autonomic computing and communication systems
Resource disconnection management in MANET driven by process time plan
Proceedings of the 1st international conference on Autonomic computing and communication systems
Modified AODV protocol for prevention of denial of service attacks in wireless ad hoc networks
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Security association in mobile ad hoc networks through self-organized public key certification
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
An electronic voting protocol with deniable authentication for mobile ad hoc networks
Computer Communications
HEAP: A packet authentication scheme for mobile ad hoc networks
Ad Hoc Networks
Anonymous Routing for Mobile Wireless Ad Hoc Networks
International Journal of Distributed Sensor Networks - Heterogenous Wireless Ad Hoc and Sensor Networks
Distributed key management for dynamic groups in MANETs
Pervasive and Mobile Computing
CASAN: Clustering algorithm for security in ad hoc networks
Computer Communications
Malicious node detection in wireless sensor networks using weighted trust evaluation
Proceedings of the 2008 Spring simulation multiconference
Role management in adhoc networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network
Computational Intelligence and Security
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks
Information Security and Cryptology
Wireless Cyber Assets Discovery Visualization
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Effective Key Management Protocol for Extremely Self-Motivated Environment
Information Systems Management
MobiSEC: a novel security architecture for wireless mesh networks
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
A unified security framework with three key management schemes for wireless sensor networks
Computer Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
WSEAS Transactions on Computers
Robust and scalable transmission of arbitrary 3D models over wireless networks
Journal on Image and Video Processing - 3D Image and Video Processing
Efficient public key authentication in MANET
Proceedings of the International Conference on Advances in Computing, Communication and Control
Prevention of flooding attacks in mobile ad hoc networks
Proceedings of the International Conference on Advances in Computing, Communication and Control
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
Future Generation Computer Systems
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
Journal of Computer Science and Technology
Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Random sampling key revocation scheme for distributed sensor networks
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Dynamic trust establishment in emergency ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A protocol for secure and energy-aware reprogramming in WSN
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Multimodal security enforcement framework for wireless ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Robust and secure routing scheme for wireless multihop network
Personal and Ubiquitous Computing
PKIX Certificate Status in Hybrid MANETs
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Weighted trust evaluation-based malicious node detection for wireless sensor networks
International Journal of Information and Computer Security
An on-demand key establishment protocol for MANETs
International Journal of Wireless and Mobile Computing
Secure hosts auto-configuration in mobile ad hoc networks
Ad Hoc Networks
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
Secret instantiation in ad-hoc networks
Computer Communications
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
IEEE Transactions on Information Forensics and Security
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks
Proceedings of the 16th ACM conference on Computer and communications security
A proposal for secure vehicular communications
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
Security enhancement over ad-hoc AODV routing protocol
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Self-healing key management service for mobile ad hoc networks
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
d-key dynamic encryption: a security enhancement protocol for mobile ad hoc network
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
SWCA: a secure weighted clustering algorithm in wireless ad hoc networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Survivable keying for wireless ad hoc networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
An authenticated dynamic IP configuration scheme for mobile ad hoc networks
WOCN'09 Proceedings of the Sixth international conference on Wireless and Optical Communications Networks
EURASIP Journal on Wireless Communications and Networking
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
REputation based Clustering Algorithm for security management in ad hoc networks with liars
International Journal of Information and Computer Security
Distributed authentication for services commercialization in ad hoc networks
Mobility '09 Proceedings of the 6th International Conference on Mobile Technology, Application & Systems
A robust and redundant key management for mobile ad hoc networks
ISWCS'09 Proceedings of the 6th international conference on Symposium on Wireless Communication Systems
Robust and efficient communication overlays for trust authority computations
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Noninteractive self-certification for long-lived mobile ad hoc networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A key management scheme for ad hoc networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Petri analysis on multi-path pre-detection of Byzantine nodes in WMN
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Gateway Selection Protocol in Hybrid MANET Using DYMO Routing
Mobile Networks and Applications
OMH--Suppressing Selfish Behavior in Ad hoc Networks with One More Hop
Mobile Networks and Applications
Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
REDMAN: An optimistic replication middleware for read-only resources in dense MANETs
Pervasive and Mobile Computing
Methodology to bridge different domains of trust in mobile communications
iTrust'03 Proceedings of the 1st international conference on Trust management
A modular architecture for distributed IDS in MANET
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartIII
A smart card based distributed identity management infrastructure for mobile ad hoc networks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Mobile phones as secure gateways for message-based ubiquitous communication
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Reliable delivery of event data from sensors to actuators in pervasive computing environments
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Building a trusted community for mobile ad hoc networks using friend recommendation
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
Certificate status validation in mobile ad hoc networks
IEEE Wireless Communications
Distributed dynamic protection of services on ad hoc and peer to peer networks
IPOM'07 Proceedings of the 7th IEEE international conference on IP operations and management
Cost-sensitive intrusion responses for mobile ad hoc networks
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
A global authentication scheme for mobile ad-hoc networks
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Multigrid based key predistribution scheme in ad hoc networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
An efficient certificate authority for ad hoc networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Key distribution in mobile ad hoc networks based on message relaying
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Authenticating DSR using a novel multisignature scheme based on cubic LFSR sequences
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
A key management scheme combined with intrusion detection for mobile ad hoc networks
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
A group-based key management protocol for mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Detection of radio interference attacks in VANET
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
On the connectivity of key-distribution strategies in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Revising centralized certificate validation standards for mobile and wireless communications
Computer Standards & Interfaces
MMS: an autonomic network-layer foundation for network management
IEEE Journal on Selected Areas in Communications
Energy efficient learning solution for intrusion detection in wireless sensor networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
A self-organized mechanism for thwarting malicious access in ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Data security in MANETs by integrating multipath routing and secret sharing
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 1
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
A novel trust evaluation model for mobile P2P networks
NPC'10 Proceedings of the 2010 IFIP international conference on Network and parallel computing
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Secure neighborhood routing protocol
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
On the insecurity of proactive RSA in the URSA mobile ad hoc network access control protocol
IEEE Transactions on Information Forensics and Security
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
A spontaneous ad hoc network to share WWW access
EURASIP Journal on Wireless Communications and Networking
Efficient certification path discovery for MANET
EURASIP Journal on Wireless Communications and Networking
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
A lightweight group-key management protocol for secure ad-hoc-network routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Energy aware topology security scheme for mobile ad hoc network
Proceedings of the 2011 International Conference on Communication, Computing & Security
A decentralized approach to secure management of nodes in distributed sensor networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
Secure routing in ad hoc networks and a related intrusion detection problem
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
SPREAD: improving network security by multipath routing
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Shared RSA key generation in a mobile ad hoc network
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Network trust management in emergency situations
Journal of Computer and System Sciences
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
Efficient public key certificate management for mobile ad hoc networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Detecting misbehaving nodes in MANETs
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Secured routing over MANET with power management
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
GRAP: Grey risk assessment based on projection in ad hoc networks
Journal of Parallel and Distributed Computing
SOMA: self-organised mesh authentication
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Trust-based minimum cost opportunistic routing for Ad hoc networks
Journal of Systems and Software
Research challenges towards the Future Internet
Computer Communications
A secure dominating set based routing and key management scheme in mobile ad hoc network
WSEAS TRANSACTIONS on COMMUNICATIONS
Protocols for supporting a public key infrastructure in ad hoc networks
Proceedings of the 11th international conference on Security Protocols
Trust establishment in ad hoc and sensor networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Identity-based key distribution for mobile Ad Hoc networks
Frontiers of Computer Science in China
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
A secure global state routing for mobile ad hoc networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Discrete optimization models for cooperative communication in ad hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Key revocation for identity-based schemes in mobile ad hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Secure data transmission on multiple paths in mobile ad hoc networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Multistage authentication scheme for mobile ad-hoc network using clustering mechanism
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
A key management scheme for cross-layering designs in wireless sensor networks
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
SKiMPy: a simple key management protocol for MANETs in emergency and rescue operations
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Security analysis of multi-path routing scheme in ad hoc networks
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Improvement of the naive group key distribution approach for mobile ad hoc networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Anonymous routing in wireless mobile ad hoc networks to prevent location disclosure attacks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
Key establishment between heterogenous nodes in wireless sensor and actor networks
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Cluster-Based certificate chain for mobile ad hoc networks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Cluster-Based secure data transmission solution for ad hoc network
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
Certificate management system in MANET for ubiquitous computing
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
Context-Enhanced authentication for infrastructureless network environments
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Distributed certificate authority under the GRID-Location aided routing protocol
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Session key agreement protocol for end-to-end security in MANET
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Self-organized security architecture for MANET
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
A self-organized authentication architecture in mobile ad-hoc networks
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Autonomic security for home networks
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Dependable propagating routing information in MANET
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Threshold cryptography in mobile ad hoc networks
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
A new scheme for key management in ad hoc networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Efficient secure aggregation in sensor networks
HiPC'04 Proceedings of the 11th international conference on High Performance Computing
UGSP: secure key establishment protocol for ad-hoc networks
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
A composite key management scheme for mobile ad hoc networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i)
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Self-configurable key pre-distribution in mobile ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Intelligent hierarchical intrusion detection system for secure wireless ad hoc network
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
Applying mobile agent to intrusion response for ad hoc networks
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
Overview the key management in ad hoc networks
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
An efficient access control model for mobile ad-hoc communities
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A novel intrusion detection method for mobile ad hoc networks
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Communications in unknown networks: preserving the secret of topology
SIROCCO'05 Proceedings of the 12th international conference on Structural Information and Communication Complexity
How to generate universally verifiable signatures in ad-hoc networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Analyzing stigmergic learning for self-organizing mobile ad-hoc networks (MANET's)
Engineering Self-Organising Systems
DSO: dependable signing overlay
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Public key cryptography sans certificates in ad hoc networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Provably-Secure two-round password-authenticated group key exchange in the standard model
IWSEC'06 Proceedings of the 1st international conference on Security
Identification in infrastructureless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Verifiable agreement: limits of non-repudiation in mobile peer-to-peer ad hoc networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Extending OLSR functionalities to PKI management
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part I
A review of routing protocols for mobile ad hoc networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Analytical models for trust based routing protocols in wireless ad hoc networks
ACM SIGSOFT Software Engineering Notes
A framework of deployment strategy for hierarchical WSN security management
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Addressing the requirements of QoS management for wireless ad hoc networks
Computer Communications
Security for cluster based ad hoc networks
Computer Communications
Advanced secure multimedia services for digital homes
Information Systems Frontiers
Local key management in opportunistic networks
International Journal of Communication Networks and Distributed Systems
A key-distribution mechanism for wireless sensor networks using Zig-Zag product
International Journal of Ad Hoc and Ubiquitous Computing
Trustworthiness and authentication in ubiquitous computing
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
Self-organizing life cycle management of mobile ad hoc networks
Security and Communication Networks
A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs)
Proceedings of the 2012 Information Security Curriculum Development Conference
A mobile-certificate security method of satellite-earth integration networks
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Security and Communication Networks
Personal and Ubiquitous Computing
Secure local algorithm for establishing a virtual backbone in 3D ad hoc network
International Journal of Networking and Virtual Organisations
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
A communication efficient group key distribution scheme for MANETs
NSS'12 Proceedings of the 6th international conference on Network and System Security
Security Management for Mobile Ad Hoc Network of Networks MANoN
International Journal of Mobile Computing and Multimedia Communications
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
Distributed and Parallel Databases
Safeguarding ad hoc networks with a self-organized membership control system
Computer Networks: The International Journal of Computer and Telecommunications Networking
Content-location based key management scheme for content centric networks
Proceedings of the 6th International Conference on Security of Information and Networks
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
International Journal of Ad Hoc and Ubiquitous Computing
Mobile Networks and Applications
Anonymous Shared Certificate Entity Authentication Protocol
Wireless Personal Communications: An International Journal
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
Information Sciences: an International Journal
Hi-index | 0.00 |
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in the design of these networks is their vulnerability to security attacks. In this article, we study the threats on ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks. We also use replication and new cryptographic schemes, such as threshold cryptography, to build a highly secure and highly available key management service, which terms the core of our security framework